咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 101 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 247 篇 工学
    • 183 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 66 篇 信息与通信工程
    • 54 篇 控制科学与工程
    • 43 篇 生物工程
    • 33 篇 电气工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 网络空间安全
    • 22 篇 电子科学与技术(可...
    • 21 篇 安全科学与工程
    • 17 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
  • 137 篇 理学
    • 65 篇 数学
    • 46 篇 生物学
    • 32 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 17 篇 化学
    • 13 篇 系统科学
    • 12 篇 海洋科学
  • 85 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 42 篇 医学
    • 33 篇 基础医学(可授医学...
    • 32 篇 临床医学
    • 23 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 25 篇 法学
    • 23 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 53 篇 accuracy
  • 32 篇 convolutional ne...
  • 27 篇 deep learning
  • 22 篇 real-time system...
  • 21 篇 computational mo...
  • 21 篇 feature extracti...
  • 17 篇 support vector m...
  • 17 篇 predictive model...
  • 17 篇 machine learning
  • 16 篇 data models
  • 16 篇 training
  • 14 篇 internet of thin...
  • 14 篇 artificial intel...
  • 13 篇 data mining
  • 13 篇 security
  • 13 篇 cloud computing
  • 12 篇 random forests
  • 12 篇 technological in...
  • 11 篇 medical services
  • 11 篇 optimization

机构

  • 16 篇 lovely professio...
  • 14 篇 maharishi school...
  • 12 篇 centre of interd...
  • 12 篇 department of ma...
  • 10 篇 department of ma...
  • 8 篇 program of maste...
  • 8 篇 master of comput...
  • 7 篇 master program o...
  • 7 篇 school of comput...
  • 7 篇 radiology techni...
  • 7 篇 prince shri venk...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of ma...
  • 6 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 11 篇 bens pardamean
  • 9 篇 teddy suparyanto
  • 7 篇 pardamean bens
  • 7 篇 thotad puneeth n...
  • 7 篇 asha v.
  • 7 篇 jayadurga r.
  • 7 篇 hiroshi hashimot...
  • 6 篇 r. jayadurga
  • 6 篇 puneeth n. thota...
  • 6 篇 binju saju
  • 6 篇 ginni nijhawan
  • 6 篇 pundru chandra s...
  • 6 篇 manish kumar
  • 6 篇 v. asha
  • 5 篇 j. relin francis...
  • 5 篇 ali albawi
  • 5 篇 gaol ford lumban
  • 5 篇 yasuhiro ohyama
  • 5 篇 krisna adiyarta
  • 5 篇 shanta kallur

语言

  • 432 篇 英文
  • 96 篇 其他
  • 3 篇 日文
  • 3 篇 中文
  • 1 篇 德文
检索条件"机构=Master of Science in Computer Science DigiPen Institute of Technology"
530 条 记 录,以下是101-110 订阅
排序:
Bluetooth Vulnerabilities and Security
Bluetooth Vulnerabilities and Security
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mareeswari V Vijayan R Ashish Shukla Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Master of Computer Applications School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Fake News Detection Review: Concepts, Tools, Research GAPS, and Possible solutions
Fake News Detection Review: Concepts, Tools, Research GAPS, ...
收藏 引用
International Conference on Network Applications Protocols and Services (NETAPPS)
作者: Sapana Yakkundi Rudragoud Patil Swetha Indudhar Goudar Dept. of Computer Science and Engineering KLS Gogte Institute of Technology Belagavi Karnataka India Department of Computer Science and Engineering KLS Gogte Institute of Technology Belagavi Karnataka India Department. of Master of Computer Applications KLS Gogte Institute of Technology Belagavi Karnataka India
The increasing number of social platforms means that there is a rapid expansion of online data. However, not all of this data can be trusted, as some users intentionally manipulate information to spread false news for... 详细信息
来源: 评论
Image To Text Description Platform For Yakshagana Images By Detecting Crown Using CNN
Image To Text Description Platform For Yakshagana Images By ...
收藏 引用
Artificial Intelligence and Data Engineering (AIDE), International Conference on
作者: Kiranraj M Anantha Murthy Manish Prathwini Prathwini Savitha G Harshitha G M Department of Master of Computer Applications NMAM Institute of Technology NITTE (Deemed to be University) Nitte Karnataka India Department of Master of Computer Applications NMAM Institute of Technology NITTE (Deemed to be University) Nitte Karkala India Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Manipal
This research called "Yakshakatha – Image to Text Platform for Yakshagana Images." It employs deep learning to classify crowns in Yakshagana Kirita using CNN classification. Yakshagana is a traditional Sout... 详细信息
来源: 评论
Analyzing the Benefits of Applying Machine Learning to Real-Time Data Analysis  3
Analyzing the Benefits of Applying Machine Learning to Real-...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Yadav, Rakesh Kumar Mahesh, T.R. Kumar, Ajay Jayadurga, R. Vishal, A. Sood, Gourav Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Bangalore India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai127 India Department of Computer Engineering Vishwakarma Institute of Information Technology Pune India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The application of device learning to actual-time data analysis has the potential to revolutionize the way businesses make decisions. With the capacity to procedure big volumes of data fast and correctly, system learn... 详细信息
来源: 评论
Exploring the Approaches to Secure Mobile Devices in Wireless Networks  15
Exploring the Approaches to Secure Mobile Devices in Wireles...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Pandian, Rajesh Garima Jayadurga, R. Karnik, Madhuri P. Grover, Madhur Naval, Preeti Karnataka Bangalore India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Department of Master of Business Administration Prince Shri Venkateshwara Padmavathy Engineering College Chennai127 India Department of Computer Engineering Vishwakarma Institute of Technology Pune India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and technology Chitkara University Punjab India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India
This paper explores various approaches used to relaxed mobile devices from intrusions in wireless networks. The contemporary strategies contemporary security, inclusive of encryption, authentication and authorization ... 详细信息
来源: 评论
An Analysis of the Impact of DNS-Based Authentication on Wireless Network Security  1
An Analysis of the Impact of DNS-Based Authentication on Wir...
收藏 引用
1st IEEE International Conference on Emerging Research in Computational science, ICERCS 2023
作者: Gawali, Piyush P. Das, Neeraj Rajesh, A. Shukla, Anupam Sohal, Jagmeet Jayadurga, R. Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science Engineering Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai127 India
This paper investigates the effect of DNS-primarily based authentication on wireless network safety. DNS-primarily based authentication is used to authenticate consumer credentials on Wi-Fi networks, generally primari... 详细信息
来源: 评论
Exploring the predictive potential of artificial neural networks in enhancing mechanical properties of derivatives of graphene nanocomposites: a data-driven approach
收藏 引用
International Journal of Information technology (Singapore) 2025年 第2期17卷 999-1005页
作者: Rao, D. Nageswara Dahiya, Mamta Arora, Amit Kumar Jandwani, Paras Verma, Gunjan CSE ACED Alliance University Chikkahagade cross Anekal Bangalore India MAIT Maharaja Agrasen University Himachal Pradesh Solan India Computer Science and Engineering IIT Madras Chennai India Accenture LLP Philadelphia PA United States Dept. of Master of Computer Applications G L Bajaj Institute of Technology and Management Uttar Pradesh Greater Noida India
The given manuscript delves into the realm of materials science and engineering, specifically focusing on the utilization of different derivatives of graphene reinforced in matrix material (DGMM’s) to enhance mechani... 详细信息
来源: 评论
A Survey on Privacy-Preserving Federated Learning in Internet of Things (IoT)
A Survey on Privacy-Preserving Federated Learning in Interne...
收藏 引用
Next Generation Communication & Information Processing (INCIP), International Conference on
作者: S. Raghav B. Vamsi Krishna Vanipriya Ch Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Master of Computer Applications Sir M Visvesvaraya Institute of Technology Bengaluru India
This survey article provides a comprehensive overview of Privacy-preserving Federated Learning (FL) in the Internet of Things (IoT), focusing on secure collaborative learning with distributed data. In response to the ... 详细信息
来源: 评论
Deep Reinforcement Learning-based Obstacle Avoidance for Robot Movement in Warehouse Environments  6
Deep Reinforcement Learning-based Obstacle Avoidance for Rob...
收藏 引用
6th IEEE International Conference on Civil Aviation Safety and Information technology, ICCASIT 2024
作者: Li, Keqin Chen, Jiajing Yu, Dezhi Dajun, Tao Qiu, Xinyu Lian, Jieting Ji, Ryan Zhang, Shengyuan Wan, Zhenyu Sun, Baiwei Hong, Bo Ni, Fanghao Han, Jiaqi Ama University Department of Computer Science Quezon Philippines Courant Institute New York University 251 Mercer St New YorkNY10012 United States University of California Berkeley University Avenue and Oxford St School of Information BerkeleyCA94720 United States Carnegie Mellon University Master of Science in Mechanical Engineering School of Engineering 5000 Forbes Avenue PittsburghPA United States Northeastern University College of Engineering Seattle United States School of Professional Studies New York University Master of Science in Database Technology 50 West 4th Street New YorkNY United States Cornell University College of Engineering 616 Thurston Ave IthacaNY14853 United States Cornell University Master of Professional Science in Applied Statistics-Data Science College of Computing and Information Science 616 Thurston Ave IthacaNY United States Independent Researcher Beijing China University of California Irvine Master of Computer Science Donald Bren School of Information and Computer Sciences 510 Aldrich Hall IrvineCA United States Northern Arizona University School of Informatics Computing and Cyber Systems FlagstaffAZ United States Shanghai Institute of Technology Shanghai China
This paper proposes a deep reinforcement learning based on the warehouse environment, the mobile robot obstacle avoidance Algorithm. Firstly, the value function network is improved based on the pedestrian interaction.... 详细信息
来源: 评论
Analogous Particle Swarm Optimization for Choosing Optimal Selection of Virtual Machine in Cloud  12
Analogous Particle Swarm Optimization for Choosing Optimal S...
收藏 引用
12th International Conference on computer Communication and Informatics, ICCCI 2022
作者: Kumar, R. Prasanna Vignesh, T. Venkateswarulu, Balaji Vijayan Sivakumar, R. Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Vidyapeetham Chennai India Srm Institute of Science and Technology Department of Master of Computer Application Chennai Ramapuram India Vignan's Foundation for Science Technology and Research Department of Computer Science and Engineering Vadlamudi AP Guntur India Easwari Engineering College Dept of Physics Chennai Ramapuram India
Cloud computing is one of the chief elements in Medical Care Administrations. It tends to be utilized to recover data about patients, their records identified with diagnosing, therapy taken and other clinical data in ... 详细信息
来源: 评论